Penetration testing bY eXpl0i13r
Saturday, 18 April 2020
Dockers and Containers
›
For years, developer had a challenge setting up development environment with the right configurations of tools as well as time required fo...
1 comment:
Monday, 13 April 2020
LSASS Dumping Methods ( For Mimikatz )
›
In every attack we need to get the windows credentials, this super important task. We need to target "LSASS.EXE" process and dum...
Wednesday, 1 April 2020
Executing Commands via Node.js ( Portable Node.exe )
›
Was exploring Node.js and thought to publish article here on how we can leverage Node.js in pentesting. I saw few articles of Malware...
Document Object Model and DOM XSS
›
DOM (Document Object Model) How many times you saw applications in past where even if you click on some of the buttons or select items fr...
Saturday, 3 August 2019
Remote Shares
›
File Sharing Server on Kali Download SMBServer.py from following link, https://github.com/SecureAuthCorp/impacket/blob/master/exampl...
Saturday, 28 January 2017
Cryptography Mind Map
›
Hi, Sharing my Crypto Mind Map for quick reference. Download from here Hope this helps!
50 comments:
Friday, 27 January 2017
Office of Foreign Asset Control (OFAC)
›
Office of Foreign Asset Control (OFAC) The Office of Foreign Assets Control (OFAC) is a financial intelligence and enforcement agency of...
1 comment:
›
Home
View web version